Skip to content

Update module golang.org/x/crypto to v0.45.0 [SECURITY]#756

Merged
renovate[bot] merged 1 commit intomasterfrom
renovate/go-golang.org-x-crypto-vulnerability
Feb 11, 2026
Merged

Update module golang.org/x/crypto to v0.45.0 [SECURITY]#756
renovate[bot] merged 1 commit intomasterfrom
renovate/go-golang.org-x-crypto-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Nov 20, 2025

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/crypto v0.32.0v0.45.0 age confidence

GitHub Vulnerability Alerts

CVE-2025-22869

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

CVE-2025-58181

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

CVE-2025-47914

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Copy Markdown
Contributor Author

renovate bot commented Nov 20, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 1 additional dependency was updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
golang.org/x/net v0.34.0 -> v0.47.0
go 1.21 -> 1.24.0

@codecov
Copy link
Copy Markdown

codecov bot commented Nov 20, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 82.20%. Comparing base (2d6d27f) to head (f2fd146).
⚠️ Report is 1 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master     #756      +/-   ##
==========================================
- Coverage   82.23%   82.20%   -0.04%     
==========================================
  Files         111      111              
  Lines        6489     6489              
==========================================
- Hits         5336     5334       -2     
- Misses        757      758       +1     
- Partials      396      397       +1     
Flag Coverage Δ
go 82.20% <ø> (-0.04%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@theodorsm
Copy link
Copy Markdown
Member

We are not using the SSH package provided by the crypto library, so we are not affected by these vulnerabilities. This also requires us to upgrade the minimum go version to 1.24.0, which we are not doing yet.

@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from 48b603e to 1fa7fd2 Compare November 20, 2025 21:02
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 2 times, most recently from aa9fb66 to fbbeef6 Compare December 3, 2025 23:02
@renovate
Copy link
Copy Markdown
Contributor Author

renovate bot commented Dec 11, 2025

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 1 additional dependency was updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
golang.org/x/net v0.34.0 -> v0.47.0
go 1.24 -> 1.24.0

@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 2 times, most recently from f550ffc to 767d4bd Compare December 18, 2025 19:38
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 2 times, most recently from 44303d8 to f371b0e Compare December 20, 2025 23:44
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 3 times, most recently from 2af41c6 to a5198b0 Compare January 10, 2026 12:29
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 9 times, most recently from 8680ef7 to 048e794 Compare January 22, 2026 12:15
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 5 times, most recently from 6269fd1 to 44f1570 Compare February 4, 2026 08:09
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch 4 times, most recently from ff7b410 to 21bdb1e Compare February 10, 2026 19:56
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from 21bdb1e to f2fd146 Compare February 11, 2026 10:47
@renovate renovate bot merged commit 605dc7e into master Feb 11, 2026
19 checks passed
@renovate renovate bot deleted the renovate/go-golang.org-x-crypto-vulnerability branch February 11, 2026 12:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants